Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1458052 - (CVE-2017-7514) CVE-2017-7514 SAT 5 XSS in the Failed Systems page
CVE-2017-7514 SAT 5 XSS in the Failed Systems page
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170621,repor...
: Security
Depends On: 1452080
Blocks: 1452673
  Show dependency treegraph
 
Reported: 2017-06-01 17:35 EDT by Kurt Seifried
Modified: 2017-06-28 11:58 EDT (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A cross-site scripting (XSS) flaw was found in how the failed action entry is processed in Satellite 5. A user able to specify a failed action could exploit this flaw to perform XSS attacks against other Satellite users.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-06-26 13:40:51 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1558 normal SHIPPED_LIVE Moderate: Red Hat Satellite 5.8.0 General Availability 2017-06-20 20:20:23 EDT

  None (edit)
Description Kurt Seifried 2017-06-01 17:35:28 EDT
Jan Hutar of Red Hat reports: 

By altering client side code or with a custom event failure message (via schedule.failSystemAction API call, the Schedule -> Failed Actions -> <action> -> Failed Systems page allows XSS.
Comment 1 Kurt Seifried 2017-06-01 17:36:28 EDT
Acknowledgements:

Name: Jan Hutar (Red Hat)
Comment 2 errata-xmlrpc 2017-06-20 16:23:08 EDT
This issue has been addressed in the following products:

  Red Hat Satellite 5.8
  Red Hat Satellite 5.8 ELS

Via RHSA-2017:1558 https://access.redhat.com/errata/RHSA-2017:1558

Note You need to log in before you can comment on or make changes to this bug.